Hackers exploit security testing apps to breach Fortune 500 firms
Recorded: Jan. 21, 2026, 3:03 p.m.
| Original | Summarized |
Hackers exploit security testing apps to breach Fortune 500 firms News Featured Credential-stealing Chrome extensions target enterprise HR platforms Microsoft releases OOB Windows updates to fix shutdown, Cloud PC bugs Jordanian pleads guilty to selling access to 50 corporate networks Ingram Micro says ransomware attack affected 42,000 people You Got Phished? Of Course! You're Human... Hackers exploit security testing apps to breach Fortune 500 firms GitLab warns of high-severity 2FA bypass, denial-of-service flaws Tesla hacked, 37 zero-days demoed at Pwn2Own Automotive 2026 Tutorials Latest How to access the Dark Web using the Tor Browser How to enable Kernel-mode Hardware-enforced Stack Protection in Windows 11 How to use the Windows Registry Editor How to backup and restore the Windows Registry How to start Windows in Safe Mode How to remove a Trojan, Virus, Worm, or other Malware How to show hidden files in Windows 7 How to see hidden files in Windows Webinars Latest Qualys BrowserCheck STOPDecrypter AuroraDecrypter FilesLockerDecrypter AdwCleaner ComboFix RKill Junkware Removal Tool Deals Categories eLearning IT Certification Courses Gear + Gadgets Security VPNs Popular Best VPNs How to change IP address Access the dark web safely Best VPN for YouTube Forums Virus Removal Guides HomeNewsSecurityHackers exploit security testing apps to breach Fortune 500 firms Hackers exploit security testing apps to breach Fortune 500 firms By Bill Toulas January 21, 2026 Threat actors are exploiting misconfigured web applications used for security training and internal penetration testing, such as DVWA, OWASP Juice Shop, Hackazon, and bWAPP, to gain access to cloud environments of Fortune 500 companies and security vendors. Pentera researchers found 1,926 live, vulnerable applications exposed on the public web, often linked to overly privileged IAM (Identity and Access Management) roles and deployed on AWS, GCP, and Azure cloud environments. Overview of exposed testing web apps Accessing the Secrets Manager on an exposed AWS accountSource: Pentera Labs Activating the XMRig minerSource: Pentera Labs Re-downloading the miner from GitHubSource: Pentera Labs 7 Security Best Practices for MCP Related Articles: Actively Exploited Bill Toulas Previous Article Post a Comment Community Rules You need to login in order to post a comment You may also like: Popular Stories Microsoft releases OOB Windows updates to fix shutdown, Cloud PC bugs Ingram Micro says ransomware attack affected 42,000 people New PDFSider Windows malware deployed on Fortune 100 firm's network Sponsor Posts Identity Governance & Threat Detection in one: Get a guided tour of our platform Discover how to scale IT infrastructure reliably without adding toil or burnout. Discover how phishing kits are sold and deployed. Download the full research report. Upcoming Webinar Follow us: Main Sections News Community Forums Useful Resources Welcome Guide Company About BleepingComputer Terms of Use - Privacy Policy - Ethics Statement - Affiliate Disclosure Copyright @ 2003 - 2026 Bleeping Computer® LLC - All Rights Reserved Login Username Password Remember Me Sign in anonymously Sign in with Twitter Not a member yet? Register Now Help us understand the problem. What is going on with this comment? Spam Abusive or Harmful Inappropriate content Strong language Other Read our posting guidelinese to learn what content is prohibited. Submitting... |
This report details a concerning trend: hackers are actively exploiting commonly used security testing applications – DVWA, OWASP Juice Shop, Hackazon, and bWAPP – to gain unauthorized access to the cloud environments of Fortune 500 companies and security vendors. Pentera Labs uncovered over 1,926 live, vulnerable instances of these applications exposed on the public web, often linked to overly privileged Identity and Access Management (IAM) roles within cloud environments such as Amazon Web Services (AWS), Google Cloud Platform (GCP), and Microsoft Azure. The investigation revealed that these vulnerabilities were not merely theoretical risks, but were being actively exploited with tangible consequences. Specifically, the researchers identified the deployment of cryptocurrency miners (using the XMRig tool), webshells (such as a PHP file manager capable of file manipulation and command execution), and persistent mechanisms designed to automatically reinstall the malware if deleted. The malicious actors utilized techniques like downloading additional tools encrypted with AES-256 and killing competing miners. A key element of the attack involved the use of ‘watchdog.sh’, a script that would restore itself after deletion, coupled with hardcoded authentication credentials set to Europe/Minsk (UTC+3), providing a potential clue about the origin of the attackers. The findings significantly impact organizations like Cloudflare, F5, and Palo Alto Networks, which were directly notified by Pentera and subsequently remediated the vulnerabilities. The report underscores the importance of maintaining a comprehensive inventory of all cloud resources, including security testing applications. Furthermore, the researchers strongly recommended implementing least-privilege IAM roles for non-production systems, regularly changing default credentials, and setting automatic expiration for temporary cloud resources. The active exploitation discovered by Pentera highlighted serious weaknesses in security practices, demonstrating the willingness of malicious actors to leverage readily available, intentionally vulnerable tools. The methodology employed by the attackers, including the deployment of persistent malware and the use of network analysis to identify targets and owners, exemplifies a sophisticated and targeted approach. This situation emphasizes the necessity for organizations to proactively identify and mitigate vulnerabilities in their cloud environments, recognizing that even seemingly innocuous testing applications can pose a credible threat when exposed and misconfigured. The ability of attackers to rapidly deploy tools like XMRig and actively monitor compromised systems underscores the need for robust security monitoring and incident response capabilities within these firms. |